{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:18:40Z","timestamp":1753600720190,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819619061"},{"type":"electronic","value":"9789819619078"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1907-8_29","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T19:55:27Z","timestamp":1740426927000},"page":"303-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Class-Based SHAP Analysis for Improved Explainability Insights in NIDS"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Szelest","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","unstructured":"Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (IDS). Int. J. Inf. Secur. 22(5), 1125\u20131162 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00682-2, https:\/\/link.springer.com\/https:\/\/doi.org\/10.1007\/s10207-023-00682-2","DOI":"10.1007\/s10207-023-00682-2 10.1007\/s10207-023-00682-2"},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"29_CR3","doi-asserted-by":"publisher","unstructured":"Chen, R.C., Dewi, C., Huang, S.W., Caraka, R.E.: Selecting critical features for data classification based on machine learning methods. J. Big Data 7(1), 52 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00327-4, https:\/\/journalofbigdata.springeropen.com\/articles\/https:\/\/doi.org\/10.1186\/s40537-020-00327-4","DOI":"10.1186\/s40537-020-00327-4 10.1186\/s40537-020-00327-4"},{"key":"29_CR4","doi-asserted-by":"publisher","unstructured":"Chen, X., Liu, M., Wang, Z., Wang, Y.: Explainable deep learning-based feature selection and intrusion detection method on the Internet of Things. Sensors 24(16), 5223 (2024). https:\/\/doi.org\/10.3390\/s24165223, https:\/\/www.mdpi.com\/1424-8220\/24\/16\/5223","DOI":"10.3390\/s24165223"},{"key":"29_CR5","doi-asserted-by":"publisher","unstructured":"Damasevicius, R., et al.: LITNET-2020: an annotated real-world network flow dataset for network intrusion detection. Electronics 9(5), 800 (2020). https:\/\/doi.org\/10.3390\/electronics9050800, https:\/\/www.mdpi.com\/2079-9292\/9\/5\/800","DOI":"10.3390\/electronics9050800"},{"key":"29_CR6","doi-asserted-by":"publisher","unstructured":"Ding, W., Abdel-Basset, M., Hawash, H., Ali, A.M.: Explainability of artificial intelligence methods, applications and challenges: a comprehensive survey. Inf. Sci. 615, 238\u2013292 (2022). https:\/\/doi.org\/10.1016\/j.ins.2022.10.013, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002552201132X","DOI":"10.1016\/j.ins.2022.10.013"},{"key":"29_CR7","doi-asserted-by":"publisher","unstructured":"Ma, X.A., Xu, H., Ju, C.: Class-specific feature selection via maximal dynamic correlation change and minimal redundancy. Expert Syst. Appl. 229, 120455 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2023.120455, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417423009570","DOI":"10.1016\/j.eswa.2023.120455"},{"key":"29_CR8","doi-asserted-by":"publisher","unstructured":"Molnar, C., Casalicchio, G., Bischl, B.: Interpretable machine learning \u2013 a brief history, state-of-the-art and challenges. J. Biomed. Inform. 113, 103655 (2020). https:\/\/doi.org\/10.1007\/978-3-030-65965-3_28, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046420302835, http:\/\/arxiv.org\/abs\/2010.09337","DOI":"10.1007\/978-3-030-65965-3_28"},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Nardone, D., Ciaramella, A., Staiano, A.: A sparse-modeling based approach for class specific feature selection. PeerJ Comput. Sci. 5, e237 (2019). https:\/\/doi.org\/10.7717\/peerj-cs.237, https:\/\/peerj.com\/articles\/cs-237","DOI":"10.7717\/peerj-cs.237"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Pawlicki, M., Pawlicka, A., Komisarek, M., Kozik, R., Chora\u015b, M.: The IoT threat landscape vs. machine learning, a.k.a. who attacks IoT, why do they do it, and how to prevent it? In: Buchmann, R.A., et al. (eds.) Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings). Babes, -Bolyai University, ClujNapoca (2022). https:\/\/aisel.aisnet.org\/isd2014\/proceedings2022\/ai\/7\/","DOI":"10.62036\/ISD.2022.47"},{"key":"29_CR11","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., Pawlicka, A., Kozik, R., Chora\u015b, M.: Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity. Neurocomputing, 127759 (2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.127759, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231224005307","DOI":"10.1016\/j.neucom.2024.127759"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Pawlicki, M., Pawlicka, A., \u015arutek, M., Kozik, R., Chora\u015b, M.: Interpreting intrusions - the role of explainability in AI-based intrusion detection systems BT - progress on pattern classification, image processing and communications, pp. 45\u201353. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-41630-9_5"},{"key":"29_CR13","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., Puchalski, D., Szelest, S., Pawlicka, A., Kozik, R., Chora\u015b, M.: Introducing a multi-perspective xAI tool for better model explainability. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024. Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3664476.3670905","DOI":"10.1145\/3664476.3670905"},{"key":"29_CR14","doi-asserted-by":"publisher","unstructured":"Saarela, M., Jauhiainen, S.: Comparison of feature importance measures as explanations for classification models. SN Appl. Sci. 3(2), 272 (2021). https:\/\/doi.org\/10.1007\/s42452-021-04148-9, http:\/\/link.springer.com\/https:\/\/doi.org\/10.1007\/s42452-021-04148-9","DOI":"10.1007\/s42452-021-04148-9 10.1007\/s42452-021-04148-9"},{"key":"29_CR15","doi-asserted-by":"publisher","unstructured":"Sewwandi, M., Li, Y., Zhang, J.: A class-specific feature selection and classification approach using neighborhood rough set and K-nearest neighbor theories. Appl. Soft Comput. 143, 110366 (2023). https:\/\/doi.org\/10.1016\/j.asoc.2023.110366, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494623003848","DOI":"10.1016\/j.asoc.2023.110366"},{"key":"29_CR16","unstructured":"Shafi, A.: Random Forest Classification with Scikit-Learn. Data & AI (2023)"},{"key":"29_CR17","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108\u2013116. SCITEPRESS - Science and Technology Publications (2018). https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"}],"container-title":["Communications in Computer and Information Science","Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1907-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T19:55:29Z","timestamp":1740426929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1907-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819619061","9789819619078"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1907-8_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhenzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icai12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icai.org.cn\/2024\/Organization.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}